IBM Z Pervasive Encryption provides transparent encryption of data at rest through z/OS data set encryption without requiring application changes. Key steps to get started include generating an encryption key and key label stored in the CKDS, configuring RACF to use the key label, allowing the secure key to be used as a protected key, granting access to the key label, and associating the key label with data sets by altering the RACF DFP segment or assigning to a DFSMS data class.
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Z111806 strengthen-security-sydney-v1910a
1. Strengthen your security
posture! Getting started with
IBM Z Pervasive Encryption
Tony Pearson
IBM Master Inventor,
Senior IT Management Consultant,
TechU Content Manager
2019 IBM Systems Technical University
15-17 Oct 2019 | Sydney, Australia